Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


Panda Security Launches New Panda GateDefender Performa eSeries
- New line of integrated perimeter security appliances designed for mid-size and large companies

ORLANDO, Fla., Nov. 19, 2012 /PRNewswire/ -- Panda Security, The Cloud Security Company, today announced the launch of Panda GateDefender Performa eSeries, its new, unified perimeter security device that protects against all types of threats. Panda Security's new appliance enables mid-size and large companies (50 users or more) to protect their corporate network and increase their productivity.

The solution is available in three different versions: compatible with virtualization engines, software only, and five different hardware models designed for organizations of every size. In addition, its new Panda Perimeter Management Console allows centralized and secure management and configuration of all appliances on the network from a single location, accessible from the cloud at any time. The solution is available at: http://www.pandasecurity.com/enterprise/solutions/gatedefender-performa/.

Main benefits of Panda GateDefender Performa eSeries include:

  • Flexible, cloud-based management to centrally monitor, manage and update appliances quickly and easily, anywhere, anytime.
  • Increased user productivity and optimized resource usage thanks to spam neutralization, restricted access to unproductive content and services, and bandwidth usage control.
  • Complete protection against all types of infections and intrusion attempts right from the start. Faster response to new malware threats via automatic updates and queries to the cloud.
  • High Internet availability and its routing policies allow configuration of multiple high-availability lines, as well as installation of multiple appliances in parallel to deliver fault-tolerant, secure connectivity.
  • Flexible, seamless integration with existing IT infrastructures thanks to the wide range of available versions: hardware, virtual and software appliances.

The new Panda GateDefender Performa eSeries manages companies' perimeter security needs by neutralizing viruses, spam and unauthorized access at the Internet gateway through a complete set of resources which leverage Collective Intelligence technologies. Its main features include:

  • Firewall: Ensures that inbound and outbound communications comply with the security policy.
  • Intrusion prevention system (IPS): Prevents intrusion attacks.
  • Anti-malware: Protects against all types of malicious software in email and Web traffic.
  • Content filter: Scans inbound and outbound traffic for dangerous content.
  • Anti-spam: Keeps email traffic free from junk mail.
  • Web filter: Restricts access to non-work-related Web content.
  • Multiple connection technologies to access the Internet and the corporate network. Compatible with ADSL/UMTS/GPRS/3G/USB devices.
  • VPN: Secure communication with remote offices and roaming workers with mobile devices.
  • HotSpot: Grants controlled temporary Internet access to guests or visitors to the company.
  • QoS: Minimizes unproductive and ineffective usage of precious network bandwidth.

For more information about Panda GateDefender Performa eSeries, please visit http://www.pandasecurity.com/enterprise/solutions/gatedefender-performa/.

About Panda Security

Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 56 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.

Panda Security collaborates with WWF and Project Stella as part of its Corporate Social Responsibility policy.

For more information, visit http://www.pandasecurity.com/.

SOURCE Panda Security

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
The other day I found myself in a discussion with a prospect regarding the merits of capturing complete stack traces for every transaction that flowed through their production system. You see AppDynamics doesn’t do that; we capture problematic business transactions, and this bloke seem...
In Part 1, I looked at what could be behind Facebook’s acquisition of WhatsApp and subsequent purchase of Oculus Rift. How are these seemingly different acquisitions related? There is no question that both Facebook and Google are in a race to build the next-generation computing/communi...
In the pharmaceutical industry, the drug development clock is ticking at the rate of warp-speed. As a result, companies are constantly looking for solutions to help them accelerate time to market – and many are realizing that implementing a cloud-based information management system can...
Good morning! Or evening, if you happen to be reading this on the other side of the world. Our topic for today is the internet. What? You already know about the internet? No, no, I don’t mean that internet, the boring old one you use to access YouTube and send Facebook updates, e...
Having an effective BYOD policy is one of the most critical steps to ensuring BYOD success. Learn the basics for securing your company's data and clarifying the process. Employees like the ability to choose. Whether it be choosing the hours they work or whether or not they can teleco...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE